MCQOPTIONS
Saved Bookmarks
This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What kind of task does the Leaky Bucket algorithm do in traffic shaping technique? |
| A. | Control congestion in network traffic. |
| B. | Working on routing protocol. |
| C. | Data flow control. |
| D. | None of the above |
| Answer» B. Working on routing protocol. | |
| 52. |
What kind of task does the Token Bucket Algorithm do on the network? |
| A. | Drops data packets. |
| B. | Allows for varying output rates. |
| C. | Give low priority to the data packets. |
| D. | Doesn't manage the queue regulator. |
| Answer» C. Give low priority to the data packets. | |
| 53. |
What is/are the parameters of Quality of Service? |
| A. | Connection establishment delay |
| B. | Connection establishment failure probability |
| C. | Protection and Priority |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 54. |
What is/are the characteristics of Connection Oriented Service? |
| A. | The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible. |
| B. | Connection oriented service is suitable for short communication. |
| C. | Both a and b |
| D. | The connection is not established in the connection oriented service. |
| Answer» B. Connection oriented service is suitable for short communication. | |
| 55. |
What is/are the characteristics of RSVP? |
| A. | It doesn’t provide reservations for bandwidth in multicast trees. |
| B. | It is a receiver oriented. |
| C. | Both a and b |
| D. | None of the above |
| Answer» C. Both a and b | |
| 56. |
What is/are the advantages of Token ring? |
| A. | It doesn't provide a priority system that allow administrators to use the network more frequently. |
| B. | Multiple identical MAC addresses are supported on Token ring. |
| C. | All of the above |
| D. | None of the above. |
| Answer» C. All of the above | |
| 57. |
What is/are the advantages of the TCP/IP? |
| A. | TCP/IP provides reliable communication across the internet. |
| B. | Information on the internet is carried in packets. |
| C. | TCP/IP is a robust and scalable network. |
| D. | All of the above. |
| Answer» E. | |
| 58. |
What is/are the advantages of the OSI model? |
| A. | The OSI model is not a truly general model. |
| B. | The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes |
| C. | Both a and b |
| D. | None of the above |
| Answer» C. Both a and b | |
| 59. |
What is/are the advantages of TDMA? |
| A. | provide entire bandwidth but not simultaneously |
| B. | cost effective technology |
| C. | offer personal communication |
| D. | All of the above |
| Answer» E. | |
| 60. |
What is/are the advantages of Data link layer? |
| A. | Data link is not required for the effective exchange of data between source and destination. |
| B. | Provide services to the session layer. |
| C. | The errors can be detected and corrected during the transmission of data from source to destination. |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 61. |
What is the use of TPDU in socket programming? |
| A. | It creates new socket in the transport entity when it requests for a connection. |
| B. | It allocates the table space within the transport entity. |
| C. | It is used for establishing the connection. |
| D. | None of the above. |
| Answer» B. It allocates the table space within the transport entity. | |
| 62. |
What is the use of ICMP protocol in the network? |
| A. | It provides a mechanism for host and management queries. |
| B. | There is no flow control and congestion control. |
| C. | It doesn't provide error reporting mechanism. |
| D. | All of the above |
| Answer» B. There is no flow control and congestion control. | |
| 63. |
What is the use of LAN bridges in the network? |
| A. | Provides real time and non real time services. |
| B. | Checks the MAC address of source and destination. |
| C. | Provides broadband ISDN for the data packets. |
| D. | None of the above |
| Answer» C. Provides broadband ISDN for the data packets. | |
| 64. |
What is the purpose of using pseudo header in UDP? |
| A. | The data packets are delivered sequentially. |
| B. | Find out the destination port number and source port number. |
| C. | Sends the context of a particular internet destination address to UDP. |
| D. | Verifying the UDP packet has reached its correct destination. |
| Answer» E. | |
| 65. |
What is the full form of TFTP? |
| A. | Transmission File Transport Protocol |
| B. | Trivial File Transfer Protocol |
| C. | Transport File Transfer Protocol |
| D. | None of the above |
| Answer» C. Transport File Transfer Protocol | |
| 66. |
What is the difference between Virtual Circuit and Datagram? |
| A. | The quality of service is easy in Virtual Circuit while it is difficult in Datagram. |
| B. | In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called |
| C. | The services are independent in Virtual Circuit but that won't be so in Datagrams. |
| D. | Both a and b |
| E. | Both b and c |
| Answer» C. The services are independent in Virtual Circuit but that won't be so in Datagrams. | |
| 67. |
What is the difference between TCP and UDP? |
| A. | TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee. |
| B. | The order of data will be same in TCP but that won't be so in UDP. |
| C. | TCP is unreliable protocol but UDP is a reliable protocol. |
| D. | Only a and b |
| E. | Only b and c |
| Answer» E. Only b and c | |
| 68. |
What is the difference between Token Ring and Ethernet? |
| A. | Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub. |
| B. | Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token. |
| C. | Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software |
| D. | Ethernet can support MAC address. Token ring cannot support MAC address. |
| Answer» D. Ethernet can support MAC address. Token ring cannot support MAC address. | |
| 69. |
What is the difference between TDMA and CDMA? |
| A. | In CDMA only one user is allowed to share a channel or sub channel . while it is allowed in TDMA. |
| B. | CDMA offers higher transmission quality than TDMA. |
| C. | CDMA is a dominant technology in the wireless market than TDMA. |
| D. | Both a and b |
| E. | Both b and c |
| Answer» C. CDMA is a dominant technology in the wireless market than TDMA. | |
| 70. |
What is the difference between MPLS and Virtual Circuit? |
| A. | The forwarding table is mostly used in MPLS but not in Virtual Circuit. |
| B. | The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS. |
| C. | In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 71. |
What is the difference between IPv4 and IPv6? |
| A. | The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation. |
| B. | In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits. |
| C. | The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration. |
| D. | In IPv4 the IPsec support is required while in IPv6 it is optional. |
| Answer» D. In IPv4 the IPsec support is required while in IPv6 it is optional. | |
| 72. |
What is the difference between IP and ICMP? |
| A. | IP is a reliable protocol while ICMP is an unreliable protocol. |
| B. | In IP, error checking and control are not concerns while in ICMP it concerns. |
| C. | IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. |
| D. | None of the above. |
| Answer» C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. | |
| 73. |
What is the difference between Delay and Jitter? |
| A. | Delay takes less time for buffering while jitter takes more time for buffering. |
| B. | Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay |
| C. | Time delay is a variable in delay but not in jitter. |
| D. | All of the above |
| Answer» C. Time delay is a variable in delay but not in jitter. | |
| 74. |
What is the difference between Class based QoS and Flow based QoS? |
| A. | Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation. |
| B. | Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. |
| C. | Both a and b |
| D. | None of the above. |
| Answer» B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. | |
| 75. |
What is the difference between forwarding and routing? |
| A. | Forwarding does not transmit data on outgoing links, but routing does. |
| B. | Forwarding finds suitable path for a packet than routing. |
| C. | Forwarding is a part of decision making while routing is not. |
| D. | Forwarding is used in telephony while routing is used in all networks. |
| Answer» E. | |
| 76. |
What is the default port of HTTP? |
| A. | 20 |
| B. | 101 |
| C. | 80 |
| D. | 60 |
| Answer» D. 60 | |
| 77. |
What is the default port of SMTP? |
| A. | 85 |
| B. | 70 |
| C. | 80 |
| D. | 25 |
| Answer» E. | |
| 78. |
What is Quality of Service? |
| A. | It is the capability of a network to provide better service to selected network traffic over various technologies. |
| B. | It is a priority network that provides dedicated bandwidth, controlled jitter and latency. |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 79. |
What is Packetizing? |
| A. | It is a process of dividing a long message into smaller ones. |
| B. | It is a process of encapsulating the packets into the data fields of the transport layer packet. |
| C. | It is a process of an adding headers to each packet to allow the transport layer for performing its other functions. |
| D. | All of the above. |
| Answer» E. | |
| 80. |
What is Frame Check Sequence (FCS)? |
| A. | FCS is an error recovery process. |
| B. | FCS is an upper layer data. |
| C. | FCS is an error detecting code. |
| D. | FCS is a communication protocol. |
| Answer» D. FCS is a communication protocol. | |
| 81. |
What is a path vector routing? |
| A. | network routing protocol |
| B. | inter-domain routing |
| C. | exterior gateway protocol |
| D. | None of the above |
| Answer» B. inter-domain routing | |
| 82. |
What does the Link Control Protocol (LCP) do in PPP? |
| A. | Set-up configure |
| B. | Maintaining a link |
| C. | Terminating a link |
| D. | Both b and c |
| E. | All of the above |
| Answer» F. | |
| 83. |
Three way handshake technique in TCP is used __________. |
| A. | to indicate the problems. |
| B. | to solve the problem of delayed duplicate packet. |
| C. | for data transmission |
| D. | all of the above |
| Answer» C. for data transmission | |
| 84. |
The protocol which is used for defining the legal request and replies is called ______ . |
| A. | FTP |
| B. | SMTP |
| C. | TCP |
| D. | HTTP |
| Answer» E. | |
| 85. |
The connection oriented service is a dedicated connection between the users before the data is exchanged. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 86. |
The communication structure that we need in socket programming is called as _________. |
| A. | System calls |
| B. | Socket |
| C. | Procedure |
| D. | Table space |
| Answer» C. Procedure | |
| 87. |
OSPF stands for _______ . |
| A. | Object Service Priority First |
| B. | Open Shortest Path First |
| C. | Open Space Preservation Fund |
| D. | Ocular Sun Protective Factor |
| Answer» C. Open Space Preservation Fund | |
| 88. |
If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant? |
| A. | Yes |
| B. | No |
| Answer» C. | |
| 89. |
ICMP stands for ______________ . |
| A. | Internet Component Mail Protocol |
| B. | Internet Control Mail Protocol |
| C. | Information Component Mail Protocol |
| D. | Internet Control Message Protocol |
| Answer» E. | |
| 90. |
How many layers are used in Hybrid model? |
| A. | 7 |
| B. | 3 |
| C. | 5 |
| D. | 4 |
| Answer» D. 4 | |
| 91. |
HDLC is developed by ________ . |
| A. | ISI |
| B. | ISO |
| C. | FPO |
| D. | ITC |
| Answer» C. FPO | |
| 92. |
Ethernet is a multi-access network and most successful local area networking technology. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 93. |
Differential Manchester encoding is also known as ___________ . |
| A. | Clock Signals |
| B. | Condition Diphase encoding |
| C. | Bipolar encoding |
| D. | Biphase mark code |
| Answer» C. Bipolar encoding | |
| 94. |
Data transfer is _______ in FTP. |
| A. | efficient |
| B. | reliable |
| C. | secure |
| D. | unreliable |
| Answer» C. secure | |
| 95. |
Consider the following types, I. Destination unreachable II. Source quench III. Query Messages IV. Time exceeded V . Redirection In the above, which is/are the error reporting types? |
| A. | I, II, III |
| B. | I, II, IV, V |
| C. | III, IV, V |
| D. | III, II, IV, V |
| Answer» C. III, IV, V | |
| 96. |
Consider the following things which RSVP cannot do in the network? |
| A. | It doesn’t specify the exactly reservation of the bandwidth. |
| B. | It is not a routing protocol. |
| C. | It does not perform any signaling operation. |
| D. | All of the above. |
| Answer» E. | |
| 97. |
Consider the following features, I. Load Balancing II. Security III. Easy to configure IV. Supports authentication What is/are the features of OSPF? |
| A. | II, IV |
| B. | II, III |
| C. | I, II, IV |
| D. | I, II, III |
| Answer» D. I, II, III | |
| 98. |
Connection-oriented is a _______ connection. |
| A. | secure |
| B. | virtual |
| C. | stable |
| D. | reliable |
| Answer» C. stable | |
| 99. |
Cluster is a group of ___________ . |
| A. | regions |
| B. | zones |
| C. | resources. |
| D. | parameters |
| Answer» B. zones | |
| 100. |
Both HDLC and PPP are data link layer protocols. |
| A. | True |
| B. | False |
| Answer» B. False | |